Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

How to ensure that SSH is configured on the new node

Posted on 2013-05-16
6
Medium Priority
?
686 Views
Last Modified: 2013-05-29
Dear experts here:

I am going to add a new node to the oracle cluster. On this document:
http://docs.oracle.com/cd/E11882_01/rac.112/e16794/adddelclusterware.htm#CHDFIAIE

step 4, it asked me to "Ensure that SSH is configured on the node". Then I use root account to ssh to the new node(poseidon) from an existing node(elysium). However, it gives me the following error. When I switch to "mis" user, I can SSH in without any problem. Could anybody help me to verify if the SSH is configured well. thank you.  



[root@elysium ~]# ssh poseidon
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@    WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED!     @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
Someone could be eavesdropping on you right now (man-in-the-middle attack)!
It is also possible that the RSA host key has just been changed.
The fingerprint for the RSA key sent by the remote host is
49:0f:68:1f:c1:16:83:0b:69:ef:55:27:0a:e9:82:4c.
Please contact your system administrator.
Add correct host key in /root/.ssh/known_hosts to get rid of this message.
Offending key in /root/.ssh/known_hosts:3
RSA host key for poseidon has changed and you have requested strict checking.
Host key verification failed.
[root@elysium ~]#


-----------------------------------------------



[mis@elysium ~]$ ssh poseidon
mis@poseidon's password:
Last login: Thu May 16 15:22:32 2013 from elysium.minkagroup.net
[mis@poseidon ~]$
0
Comment
Question by:Jason Yu
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
  • 2
6 Comments
 
LVL 21

Accepted Solution

by:
Mazdajai earned 1000 total points
ID: 39173235
Is it a reinstall or has the ip changed? If it is the case, remove line 3 on the file.

vi /root/.ssh/known_hosts
:3
dd
:wq

Open in new window

0
 
LVL 30

Assisted Solution

by:serialband
serialband earned 1000 total points
ID: 39173519
sed -i '3d' ~/.ssh/know_hosts
0
 

Author Comment

by:Jason Yu
ID: 39182823
After I delete the third line in this file, it works now.


Connection to poseidon closed.
[root@elysium ~]# ssh poseidon
root@poseidon's password:
Last login: Mon May 20 15:27:05 2013 from poseidon.minkagroup.net
[root@poseidon ~]#



One more question, if I want to disregard the password (so I don't need to input password every time) which should I do?

Also, how to set up log in welcome logo. thank you.
0
Connect further...control easier

With the ATEN CE624, you can now enjoy a high-quality visual experience powered by HDBaseT technology and the convenience of a single Cat6 cable to transmit uncompressed video with zero latency and multi-streaming for dual-view applications where remote access is required.

 
LVL 21

Assisted Solution

by:Mazdajai
Mazdajai earned 1000 total points
ID: 39182828
What type of distro? You need to setup key pair for passwordless login -

https://help.ubuntu.com/community/SSH/OpenSSH/Keys

Open in new window

Not sure what you mean by "log in welcome logo"?
0
 
LVL 30

Assisted Solution

by:serialband
serialband earned 1000 total points
ID: 39183369
Maybe you mean /etc/motd.  Put your text Message of the Day in the file and whenever you log in, it will be displayed.
0
 

Author Closing Comment

by:Jason Yu
ID: 39206339
thank you guys, got it solved satisfied.
0

Featured Post

Migrating Your Company's PCs

To keep pace with competitors, businesses must keep employees productive, and that means providing them with the latest technology. This document provides the tips and tricks you need to help you migrate an outdated PC fleet to new desktops, laptops, and tablets.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The purpose of this article is to demonstrate how we can use conditional statements using Python.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
Suggested Courses

721 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question